Social Engineering - Zero to Hero in Social Engineering
Security Repo
* Affiliatelinks/Werbelinks
Links auf reinlesen.de sind sogenannte Affiliate-Links. Wenn du auf so einen Affiliate-Link klickst und über diesen Link einkaufst, bekommt reinlesen.de von dem betreffenden Online-Shop oder Anbieter eine Provision. Für dich verändert sich der Preis nicht.
Naturwissenschaften, Medizin, Informatik, Technik / Anwendungs-Software
Beschreibung
This book explains the most commonly executed social engineering threats. Social engineering is closely related to psychology. Social engineering can be defined as the art of manipulating people in order to achieve a goal. After reading this book you will understand why people are the weakest link in your organisation's security posture.
You will understand the following without having to understand technical stuff (e.g. source code):
1) what the most common social engineering threats and are,
2) the impact per threat for your business,
3) how these threats can be executed and / or mitigated.
This book is written for managers rather than developers. Managers must train their employees to strengthen their personal firewall (i.e. being less likely to fall victim to manipulation), because collectively all employees make up your organisation's firewall!